[25368] in bugtraq

home help back first fref pref prev next nref lref last post

Reverse Challenge - Binary released

daemon@ATHENA.MIT.EDU (Lance Spitzner)
Mon May 6 01:04:26 2002

Date: Sun, 5 May 2002 21:05:23 -0500 (CDT)
From: Lance Spitzner <lance@honeynet.org>
To: <bugtraq@securityfocus.com>
Message-ID: <Pine.LNX.4.30.0205042141020.24742-100000@marge.spitzner.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

As announced several days ago, the Honeynet Project is
sponsoring the Reverse Challenge.  The binary has now been
officially released.  You have the next four weeks, until
24:00 GMT on Friday, 31 May, 2002, to send in your
submissions.

       http://project.honeynet.org/reverse/

WARNING:  This binary was captured in the wild.  It is
code developed and used by the blackhat community.  Do
not use a production system to analyze the binary.  This
binary has not been modified in anyway by the Project.
What we found is what you get.

On Monday, 27 May, 2002, the Honeynet Project will be
releasing additional data.  One of the questions in the
challenge is to identify the encoding process of the binary,
and develop a decoder.  The data we release on the 27th will
be encoded information, allowing you to test your decoder.


All questions and submissions should be sent to

         <challenge@honeynet.org>

Best of luck!

-- 
Lance Spitzner
http://project.honeynet.org







home help back first fref pref prev next nref lref last post